Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Which of the following algorithms produces a digital signature which is used to authenticate the bit-stream images?
What is the process of detecting unauthorized access known as?
Which of the following commands is a Packet sniffer?
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
Which of the following is an automated vulnerability assessment tool?
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000- based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
Which of the following utilities allows to view all files including invisible files and folders on a Macintosh OS X?
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?
Which of the following ports can be used for IP spoofing?
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.